1999
DOI: 10.1117/1.602060
|View full text |Cite
|
Sign up to set email alerts
|

Optical image encryption based on XOR operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 143 publications
(59 citation statements)
references
References 11 publications
0
57
0
2
Order By: Relevance
“…With Bob's second public key NB, Alice computes her encryption key EA = NB⊕X and encrypts a plain text P into a cipher text C by this encryption key in compliance with Eq. (14). Also, this encryption key cannot be inferred although eavesdroppers notice the public keys because of encrypting Bob's second public key NB with Alice's private key X.…”
Section: Proposed Asymmetric Cryptosystem Combined With D-h Secret Kementioning
confidence: 99%
See 1 more Smart Citation
“…With Bob's second public key NB, Alice computes her encryption key EA = NB⊕X and encrypts a plain text P into a cipher text C by this encryption key in compliance with Eq. (14). Also, this encryption key cannot be inferred although eavesdroppers notice the public keys because of encrypting Bob's second public key NB with Alice's private key X.…”
Section: Proposed Asymmetric Cryptosystem Combined With D-h Secret Kementioning
confidence: 99%
“…For these reasons, there has been a growing interest in optical cryptographic systems and several optical encryption techniques have been proposed in recent years [4][5][6][7][8][9][10][11][12][13]. Also, an optical XOR logic-based encryption has been introduced as one of these effective encryption algorithms [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…The symmetric encryption algorithm such as DES can be implemented optically with a bitwise XOR logical operator. Han et al suggested optical image encryption based on XOR operation [20]. A two-input XOR gate was implemented very simply using two polarizers and two liquid crystal displays.…”
Section: Optical Implementation Of Triple Desmentioning
confidence: 99%
“…Optoelectronic methods using digital logics are adequate for encryption. Some researchers reported XOR-based optical encryptions [20,21].…”
Section: Introductionmentioning
confidence: 99%
“…But, at the time of simulating attack a huge number of noises are present. In [8], showed an image encryption algorithm for high definition image this is based on the modification of AES. But, it has an unstable round number at the time of attack and also the long time recruitment s for the encryption and decryption process.…”
Section: Confidentialitymentioning
confidence: 99%